Zercurity data services
  • Summary
  • Applications (9)
  • Packages (0)
  • Vulnerabilities (16)

linux-tools-4.15.0-189

Hashes
Linux kernel version specific tools for version 4.15.0-189 This package provides the architecture dependant parts for kernel version locked tools (such as perf and x86_energy_perf_policy) for version 4.15.0-189 on 32 bit x86. You probably want to install linux-tools-4.15.0-189-<flavour>.
  • SHA256: d76d0e97013ebfb65e7b94311c49a684929b725d46116f4487c8d0e2dd77c466
  • SHA1: 29f0e9447da0be5b7b277fb4601c2dbebe5ec1ed
  • MD5: df1adf245bf56c65c8ddf0e2baa55bf8
Information
  • Version: 4.15.0-189.200
  • Filename: linux-tools-4.15.0-189_4.15.0-189.200_i386.deb
  • Size: 16018
  • Type: DEB
  • Source: linux
  • Architecture: I386
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: libaudit1 (>= 1:2.2.1), libc6 (>= 2.17), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.2-1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common

Applications

NameTypeArchSizeRisk
libcpupower.so.4.15.0-189
/usr/lib/libcpupower.so.4.15.0-189
638560
usbip
/usr/lib/linux-tools-4.15.0-189/usbip
2100760
libperf-jvmti.so
/usr/lib/linux-tools-4.15.0-189/libperf-jvmti.so
1858680
turbostat
/usr/lib/linux-tools-4.15.0-189/turbostat
1445160
cpupower
/usr/lib/linux-tools-4.15.0-189/cpupower
2447480
perf
/usr/lib/linux-tools-4.15.0-189/perf
144843760
bpftool
/usr/lib/linux-tools-4.15.0-189/bpftool
1293000
usbipd
/usr/lib/linux-tools-4.15.0-189/usbipd
2081560
x86_energy_perf_policy
/usr/lib/linux-tools-4.15.0-189/x86_energy_perf_policy
367640

Vulnerabilities

NameRiskSourceFixed
CVE-2022-339810USN
linux-tools-host
4.15.0-191.202
CVE-2022-11950USN
linux-tools-host
4.15.0-191.202
CVE-2022-25880USN
linux-tools-host
4.15.0-191.202
CVE-2022-25860USN
linux-tools-host
4.15.0-191.202
CVE-2022-197441USN
linux-tools-host
4.15.0-191.202
CVE-2022-16790USN
linux-tools-host
4.15.0-191.202
CVE-2022-17340USN
linux-tools-host
4.15.0-191.202
CVE-2022-165278USN
linux-tools-host
4.15.0-191.202
CVE-2022-04940USN
linux-tools-host
4.15.0-191.202
CVE-2022-10480USN
linux-tools-host
4.15.0-191.202
CVE-2022-349180USN
linux-tools-host
4.15.0-191.202
CVE-2022-197555USN
linux-tools-host
4.15.0-191.202
CVE-2022-172970USN
linux-tools-host
4.15.0-191.202
CVE-2022-250367USN
linux-tools-host
4.15.0-191.202
CVE-2022-205727USN
linux-tools-host
4.15.0-191.202
CVE-2022-299167USN
linux-tools-host
4.15.0-191.202

Raw Object

{
  "sha256": "d76d0e97013ebfb65e7b94311c49a684929b725d46116f4487c8d0e2dd77c466",
  "sha1": "29f0e9447da0be5b7b277fb4601c2dbebe5ec1ed",
  "md5": "df1adf245bf56c65c8ddf0e2baa55bf8",
  "type": "DEB",
  "arch": "I386",
  "name": "linux-tools-4.15.0-189",
  "filename": "linux-tools-4.15.0-189_4.15.0-189.200_i386.deb",
  "size": 16018,
  "description": "Linux kernel version specific tools for version 4.15.0-189\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 4.15.0-189 on\n32 bit x86.\nYou probably want to install linux-tools-4.15.0-189-<flavour>.",
  "url": null,
  "version": "4.15.0-189.200",
  "source": "linux",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "libaudit1 (>= 1:2.2.1), libc6 (>= 2.17), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.2-1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common",
  "applications": [
    {
      "path": "/usr/lib/libcpupower.so.4.15.0-189",
      "sha256": "63d0e9dfa0761a55b7b83b2854c8203c38056dfd046a2e2f750a4cb4d73c2f3e",
      "sha1": "92816e94219e7e39fdf261a1b98c4a9c9c6f9f90",
      "md5": "27a0d4aa1f0a2214c4def5c799fa814c",
      "name": "libcpupower.so.4.15.0-189",
      "size": 63856,
      "description": null,
      "package": 3811262,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-29T03:06:24+00:00",
      "updated_at": "2022-06-29T03:06:24+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-tools-4.15.0-189/usbip",
      "sha256": "ee8845404643c42f44b3aa359ba92aa6c83ae26b468ab2b383d875ef1c8f7429",
      "sha1": "622fc724b243a196d5db63accd874dd63a907db9",
      "md5": "ffcd9c63ab04ee8009bdd5d722c8acde",
      "name": "usbip",
      "size": 210076,
      "description": null,
      "package": 3811262,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-29T03:06:24+00:00",
      "updated_at": "2022-06-29T03:06:24+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-tools-4.15.0-189/libperf-jvmti.so",
      "sha256": "67704b2e461af3d821fa5ff6e062792f4b39195f39128e5bb0b431ba3cac882b",
      "sha1": "400539ba36096e5d405d4867cf4386793449d8be",
      "md5": "fde1abe63bf70fd5ad75ef9f24491a82",
      "name": "libperf-jvmti.so",
      "size": 185868,
      "description": null,
      "package": 3811262,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-29T03:06:24+00:00",
      "updated_at": "2022-06-29T03:06:24+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-tools-4.15.0-189/turbostat",
      "sha256": "a4053f9d5306ed3c0596bb3604f3e6d29c54d12d2d00e83a202e6722ef39bf1c",
      "sha1": "520a586387ca866b9a3ae715e5e22d1cf98eff8e",
      "md5": "ebae0c86933450a6cf33c58fc68c8244",
      "name": "turbostat",
      "size": 144516,
      "description": null,
      "package": 3811262,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-29T03:06:24+00:00",
      "updated_at": "2022-06-29T03:06:24+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-tools-4.15.0-189/cpupower",
      "sha256": "224f273fee4488d77336a0ec9236f77d906dd4bc8084a65309fa9f757115d3aa",
      "sha1": "3e61f39a0c6a1de41b62b9e3f485cb8bb339901a",
      "md5": "91979b3eff7df924ad8c31ed3d100fc7",
      "name": "cpupower",
      "size": 244748,
      "description": null,
      "package": 3811262,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-29T03:06:24+00:00",
      "updated_at": "2022-06-29T03:06:24+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-tools-4.15.0-189/perf",
      "sha256": "07d4a7ee1e1854062d36a7a67ab53914f4a0ecd7bf4f5f990786e5ab7aea92f0",
      "sha1": "8c186ce285b61d87835070976466879f82cc39bf",
      "md5": "777848e3a05bdeb65bbcd48e456d3f75",
      "name": "perf",
      "size": 14484376,
      "description": null,
      "package": 3811262,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-29T03:06:24+00:00",
      "updated_at": "2022-06-29T03:06:24+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-tools-4.15.0-189/bpftool",
      "sha256": "b962e3bd9dfd59adbe21d90dcb70c2aa52681f8f09d5d50b05aac23e13b051e1",
      "sha1": "d2a3f0d52001c32bd920feaed044e6a1e88d0ef5",
      "md5": "eca4efb78fa934a51d2e38dc78047a3f",
      "name": "bpftool",
      "size": 129300,
      "description": null,
      "package": 3811262,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-29T03:06:24+00:00",
      "updated_at": "2022-06-29T03:06:24+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-tools-4.15.0-189/usbipd",
      "sha256": "c7fb4112a8b7483cf2c20b1ce5ae12e77fd989c33f63d4b703dbaef1fbdb016f",
      "sha1": "87ea19125b561aae2e33012659f29421d0ccfd84",
      "md5": "4681161af0dfaa9b333239cfb8572e26",
      "name": "usbipd",
      "size": 208156,
      "description": null,
      "package": 3811262,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-29T03:06:24+00:00",
      "updated_at": "2022-06-29T03:06:24+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/lib/linux-tools-4.15.0-189/x86_energy_perf_policy",
      "sha256": "69b321213102004e01879b98709d1e6049989e69c5cbeed1ef9321930c27ef02",
      "sha1": "ae591ced33680faf624495f25303db664dbb70e7",
      "md5": "06cfa660d801d7facf30dd2977c2cd0e",
      "name": "x86_energy_perf_policy",
      "size": 36764,
      "description": null,
      "package": 3811262,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-29T03:06:24+00:00",
      "updated_at": "2022-06-29T03:06:24+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2022-33981",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "69f98a238bcf3c93045830fe14f650cf9c52b9e1be1068e6fdf82d9bfd0e02b5",
        "name": "linux-tools-host",
        "version": "4.15.0-191.202",
        "filename": "linux-tools-host_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T02:49:40+00:00",
      "updated_at": "2022-08-11T02:49:40+00:00"
    },
    {
      "name": "CVE-2022-1195",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "69f98a238bcf3c93045830fe14f650cf9c52b9e1be1068e6fdf82d9bfd0e02b5",
        "name": "linux-tools-host",
        "version": "4.15.0-191.202",
        "filename": "linux-tools-host_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:00:06+00:00",
      "updated_at": "2022-08-11T03:00:06+00:00"
    },
    {
      "name": "CVE-2022-2588",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "69f98a238bcf3c93045830fe14f650cf9c52b9e1be1068e6fdf82d9bfd0e02b5",
        "name": "linux-tools-host",
        "version": "4.15.0-191.202",
        "filename": "linux-tools-host_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:02:01+00:00",
      "updated_at": "2022-08-11T03:02:01+00:00"
    },
    {
      "name": "CVE-2022-2586",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "69f98a238bcf3c93045830fe14f650cf9c52b9e1be1068e6fdf82d9bfd0e02b5",
        "name": "linux-tools-host",
        "version": "4.15.0-191.202",
        "filename": "linux-tools-host_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:15:52+00:00",
      "updated_at": "2022-08-11T03:15:52+00:00"
    },
    {
      "name": "CVE-2022-1974",
      "risk": 41,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "69f98a238bcf3c93045830fe14f650cf9c52b9e1be1068e6fdf82d9bfd0e02b5",
        "name": "linux-tools-host",
        "version": "4.15.0-191.202",
        "filename": "linux-tools-host_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:16:53+00:00",
      "updated_at": "2022-08-11T03:16:53+00:00"
    },
    {
      "name": "CVE-2022-1679",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "69f98a238bcf3c93045830fe14f650cf9c52b9e1be1068e6fdf82d9bfd0e02b5",
        "name": "linux-tools-host",
        "version": "4.15.0-191.202",
        "filename": "linux-tools-host_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:24:12+00:00",
      "updated_at": "2022-08-11T03:24:12+00:00"
    },
    {
      "name": "CVE-2022-1734",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "69f98a238bcf3c93045830fe14f650cf9c52b9e1be1068e6fdf82d9bfd0e02b5",
        "name": "linux-tools-host",
        "version": "4.15.0-191.202",
        "filename": "linux-tools-host_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:26:48+00:00",
      "updated_at": "2022-08-11T03:26:48+00:00"
    },
    {
      "name": "CVE-2022-1652",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "69f98a238bcf3c93045830fe14f650cf9c52b9e1be1068e6fdf82d9bfd0e02b5",
        "name": "linux-tools-host",
        "version": "4.15.0-191.202",
        "filename": "linux-tools-host_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:29:21+00:00",
      "updated_at": "2022-08-11T03:29:21+00:00"
    },
    {
      "name": "CVE-2022-0494",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "69f98a238bcf3c93045830fe14f650cf9c52b9e1be1068e6fdf82d9bfd0e02b5",
        "name": "linux-tools-host",
        "version": "4.15.0-191.202",
        "filename": "linux-tools-host_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:31:19+00:00",
      "updated_at": "2022-08-11T03:31:19+00:00"
    },
    {
      "name": "CVE-2022-1048",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "69f98a238bcf3c93045830fe14f650cf9c52b9e1be1068e6fdf82d9bfd0e02b5",
        "name": "linux-tools-host",
        "version": "4.15.0-191.202",
        "filename": "linux-tools-host_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:39:11+00:00",
      "updated_at": "2022-08-11T03:39:11+00:00"
    },
    {
      "name": "CVE-2022-34918",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "69f98a238bcf3c93045830fe14f650cf9c52b9e1be1068e6fdf82d9bfd0e02b5",
        "name": "linux-tools-host",
        "version": "4.15.0-191.202",
        "filename": "linux-tools-host_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:41:22+00:00",
      "updated_at": "2022-08-11T03:41:22+00:00"
    },
    {
      "name": "CVE-2022-1975",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "69f98a238bcf3c93045830fe14f650cf9c52b9e1be1068e6fdf82d9bfd0e02b5",
        "name": "linux-tools-host",
        "version": "4.15.0-191.202",
        "filename": "linux-tools-host_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:45:50+00:00",
      "updated_at": "2022-08-11T03:45:50+00:00"
    },
    {
      "name": "CVE-2022-1729",
      "risk": 70,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "69f98a238bcf3c93045830fe14f650cf9c52b9e1be1068e6fdf82d9bfd0e02b5",
        "name": "linux-tools-host",
        "version": "4.15.0-191.202",
        "filename": "linux-tools-host_4.15.0-191.202_all.deb"
      },
      "created_at": "2022-08-11T03:56:09+00:00",
      "updated_at": "2022-08-11T03:56:09+00:00"
    },
    {
      "name": "CVE-2022-2503",
      "risk": 67,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "69f98a238bcf3c93045830fe14f650cf9c52b9e1be1068e6fdf82d9bfd0e02b5",
        "name": "linux-tools-host",
        "version": "4.15.0-191.202",
        "filename": "linux-tools-host_4.15.0-191.202_all.deb"
      },
      "created_at": "2023-01-29T13:12:04+00:00",
      "updated_at": "2023-01-29T13:12:04+00:00"
    },
    {
      "name": "CVE-2022-20572",
      "risk": 7,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "69f98a238bcf3c93045830fe14f650cf9c52b9e1be1068e6fdf82d9bfd0e02b5",
        "name": "linux-tools-host",
        "version": "4.15.0-191.202",
        "filename": "linux-tools-host_4.15.0-191.202_all.deb"
      },
      "created_at": "2023-03-07T11:46:12+00:00",
      "updated_at": "2023-03-07T11:46:12+00:00"
    },
    {
      "name": "CVE-2022-2991",
      "risk": 67,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "69f98a238bcf3c93045830fe14f650cf9c52b9e1be1068e6fdf82d9bfd0e02b5",
        "name": "linux-tools-host",
        "version": "4.15.0-191.202",
        "filename": "linux-tools-host_4.15.0-191.202_all.deb"
      },
      "created_at": "2023-04-21T09:38:44+00:00",
      "updated_at": "2023-04-21T09:38:44+00:00"
    }
  ],
  "risk": 78,
  "vulnerable": 78,
  "outdated": 78,
  "malicious": 0,
  "created_at": "2022-06-22T22:06:30+00:00",
  "updated_at": "2022-06-29T02:06:23+00:00",
  "deleted_at": null
}